Professional Documents
Culture Documents
com
ScienceDirect
ICT Express 7 (2021) 327–334
www.elsevier.com/locate/icte
Abstract
This article proposes an electronic payment architecture named Pure Wallet (PW), which extends the concept of Blockchain cryptocurrency
for offline transactions. The process is divided into three steps. The first step requires the use of Internet connection, to convert cryptocurrency
into a token at the token manager. The token manager initiates a transaction that requires the information in the token to complete. Then
offline transactions step is performed between electronic devices like mobile phones through a secure Near Field Communication (NFC)
using the token in senders device. The financial value in the form of a token is encrypted by the sender and sent to the receiver’s device
via NFC. In the third step, the receiver converts the received token into cryptocurrency in the presence of Internet connection by sending the
information required to complete the transaction to the token manager. The goal is to propose an electronic payment architecture utilizing
Blockchain, which will enable financial transactions without instant connection to the Internet. The Blockchain implementation in this work
utilizes smart contract in Ethereum Blockchain. The result shows a successful transfer of value without instant Internet connection. The open
issues related to Blockchain in offline transactions are listed for further research works.
⃝c 2021 The Korean Institute of Communications and Information Sciences (KICS). Publishing services by Elsevier B.V. This is an open access
article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
Keywords: Blockchain; Cryptocurrency; e-wallet; Near Field Communication (NFC); Offline transaction; Pure Wallet (PW); Smart contract
uses hardware token for completing transactions. This ap- and cons of cryptocurrency. Authors of [10] proposed the
proach succeeded in keeping the private key (in hardware) combination of Ethereum and IoTeX miner to shorten the
offline, making the wallet secure, but it still requires point of transaction time in IIoT. The same authors proposed the use
sale (POS) Internet connection to the Blockchain network to of non difficulty proof in [11] to reduce the transaction time.
make transactions. This approach uses Elliptic Curve Digital Works in IIoT as presented in [12] focused on privacy and
Signature Algorithm (ECDSA) for verification and signing of security of cryptocurrency mobile applications. It examines
transactions. The transaction is introduced into the Bitcoin Android cryptocurrency and financial services applications and
network if observed as valid by the POS. Other peers in the the underlying security profile. After examining the common
network in due course will verify and confirm the transaction
vulnerability, they reported that in terms of privacy, the finan-
before it is added to the Bitcoin network. The ledger of a Bit-
cial service applications are better and are still better (though
coin network is the end point of every confirmed Blockchain
marginally) than cryptocurrency in terms of security provi-
transaction. It takes between 10 and 40 min to complete this
process. sions. Authors of [13] proposed Multi-Factor Authentication
In [5], the authors proposed the use of Blockchain in (MFA) which tries to improve cryptocurrency security. MFA
the card payment system. This is to reduce charges from approach is hinged on time-based one-time based password
financial institutions incurred by merchants for using payment (TOTP), which is found to provide a more secure transac-
cards and to protect sensitive information especially personal tion. The authors in [14] demonstrated security-enabled near
identification details of the participants during transaction. The field communication tags using flexible architecture supporting
Blockchain has a centralized virtual ledger which controls cryptography. This is to solve the security problem of NFC by
access of participants, saves and encrypts transaction details, using symmetric and asymmetric cryptocurrency architecture.
removes the need for a trusted middleman, and limits exposure The motivation of this work is to propose an architecture
of information. A merchant local payment machine is able to that will function without instant connection to the internet.
determine at once if a card from a customer can complete As all transactions must be made with Internet connection,
a transaction within limits of the payment card terms. The it renders cryptocurrency unfit for transactions in places like
available amount is saved to the Blockchain ledger and the last rural areas, in aeroplanes (on flight) and even in case of sudden
information time update is obtainable, otherwise the system disconnection by Internet providers. The concept of offline
will refresh if the available information is outdated. Despite
crypto transaction was introduced in [15] as Pure Wallet (PW).
the contributions of this work, the authors did not consider
The scope of this work is to implement the Blockchain aspect
their Blockchain solution for offline transactions.
of PW. This article will use the concept of cryptocurrency
Authors in [6] explored the use of hardware to create a
wireless mesh connection, with other device users to overcome payment systems to explain the proposed algorithm. This
the problem of poor or no Internet connection, for Bitcoin algorithm can also be applied in other Blockchain applications
transactions. In this case, several equipments are needed to such as in IoT and conducting electronic elections. It is a
complete the setup. A block stream satellite receiver is in- combination of three steps; first is an online step, then an
stalled to download block chain data from the satellite. This offline, and finally another online step. Internet connection is
device is bulky and mostly stationary. To extend the connection required during the two online steps and NFC is required for
from the receiver, a GoTenna mesh is used to create a mobile the offline step of the transaction. Pure wallet (PW) proposes a
connection within a limited range. A device with a wallet is solution not as a replacement to the existing Internet based ar-
also required to read the downloaded information. To create a chitecture, but as an extension to enable offline cryptocurrency
means for up-link, other sets of equipment are required. This transaction, for a more rapid adoption and users convenience.
approach succeeded in extending connection to fixed areas As a brief summary, the innovation and contributions of this
without internet access. However it has the limitation of cost work include the following:
and mobility, because the hardware is costly, must be at a
certain range from other users to function, and is considerably 1 PW introduces Blockchain for offline use cases.
bulky for mobile use. 2 A new token capable of offline transfer is introduced.
The works in [7] explore the use of NFC enabled android 3 Token is time sensitive for security and avoidance of
mobile for Bitcoin transactions. In their work, the receiver double spending.
sends its account address to the sender using an NFC connec- 4 Introduces the concept of token manager.
tion. The transfer of Bitcoin follows the conventional process 5 We implemented the blockchain aspect of PW to validate
requiring an Internet connection, and takes the same length of the proposed idea.
time as regular transaction.
Authors in [8] explore the opportunities of blockchain for The rest of this article is arranged as follows: Section 2
banking and other financial institutions. The authors of [9] presents the proposed Pure Wallet system model. Section 3
compared cryptocurrency and fiat currency, and their role shows the Blockchain side implementation of the Pure Wallet
in the economy. Their attempt is to figure out how cryp- and the results are shown in Section 4. The expected benefit of
tocurrency improves fiat currency in terms of its performance the proposed approach is presented in Section 5. And finally
of peer-to-peer network transactions. It pointed out the pros the conclusion and future work are in Section 6.
328
I.S. Igboanusi, K.P. Dirgantoro, J.-M. Lee et al. ICT Express 7 (2021) 327–334
Algorithm 2: Sender to the token manager In this implementation, the sender, the receiver, and the
1 Sender sends coin to TM token manager are all different accounts on the same device.
2 mining process There is only a single miner in the network. Table 1 shows the
3 TM sends token to sender specification of the used device. All the implementation codes
4 TM initiates a new transaction for this paper have been uploaded in the Networked Systems
Lab website; its URL is in Ref. [18].
Fig. 10. (A) Represents the number and % of individuals using the Internet, 2005–2019. (B) Represents the Internet usage penetration index in % from
2000–2017, according to the International Telecommunication Union [17], and the predicted penetration index from 2018–2034.
[13] K.A. Taher, T. Nahar, S.A. Hossain, Enhanced cryptocurrency security [17] D. Sethia, D. Gupta, H. Saran, NFC secure element-based mutual
by time-based token multi-factor authentication algorithm, in: 2019 authentication and attestation for IoT access, IEEE Trans. Consum.
International Conference on Robotics, Electrical and Signal Processing Electron. 64 (4) (2018) 470–479.
Techniques (ICREST), 2019, pp. 308-312. [18] I.S. Igboanusi, K.P. Dirgantoro, J.-M. Lee, D.-S. Kim, Pure wallet
[14] T. Plos, M. Hutter, M. Feldhofer, M. Stiglic, F. Cavaliere, Security- code, networked systems lab, 2020, posted 03.09.2020, accessed
enabled near-field communication tag with flexible architecture 03.09.2020, http://nsl.kumoh.ac.kr/include/sub.php?m=134&mode=
supporting asymmetric cryptography, IEEE Trans. Very Large Scale Read&serial_no=202009030001&com_id=bi0001&menu_cd=30&
class_cd=106&Page_Num=&left=&item=&find=&m=134.
Integr. (VLSI) Syst. 21 (11) (2013) 1965–1974.
[19] Proportion of households with Internet access, ICT Facts and Figures,
[15] I.S. Igboanusi, J.M. Lee, D.S. Kim, Blockchain adoption in rural area:
International Telecommunication Union (ITU, 2017, [Online]. Avail-
The role of internet penetration, in: Proceedings of Symposium of the able, https://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx.
Korean Institute of communications and Information Sciences, 2020, [20] T. Dimitriou, Efficient, coercion-free and universally verifiable
pp. 1207–1210. blockchain-based voting, Comput. Netw. (ISSN: 1389-1286) 174
[16] R. Jin, K. Zeng, Secure inductive-coupled near field communication (2020) http://dx.doi.org/10.1016/j.comnet.2020.107234.
at physical layer, IEEE Trans. Inf. Forensics Secur. 13 (12) (2018)
3078–3093.
334